Results 11 to 20 of about 6,166,224 (352)
Using deep learning to solve computer security challenges: a survey [PDF]
Although using machine learning techniques to solve computer security challenges is not a new idea, the rapidly emerging Deep Learning technology has recently triggered a substantial amount of interests in the computer security community.
Yoon-Ho Choi+7 more
doaj +2 more sources
Computer Security Incident Response Team Effectiveness: A Needs Assessment. [PDF]
Computer security incident response teams (CSIRTs) respond to a computer security incident when the need arises. Failure of these teams can have far-reaching effects for the economy and national security.
Van der Kleij R, Kleinhuis G, Young H.
europepmc +2 more sources
Ethical Frameworks and Computer Security Trolley Problems: Foundations for Conversations [PDF]
The computer security research community regularly tackles ethical questions. The field of ethics / moral philosophy has for centuries considered what it means to be"morally good"or at least"morally allowed / acceptable". Among philosophy's contributions
Tadayoshi Kohno, Y. Acar, Wulf Loh
semanticscholar +1 more source
SoK: Explainable Machine Learning for Computer Security Applications [PDF]
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine learning (ML) pipelines. We systematize the increasingly growing (but fragmented) microcosm of studies that develop and utilize XAI methods for defensive and offensive ...
A. Nadeem+6 more
semanticscholar +1 more source
Exploiting Programmatic Behavior of LLMs: Dual-Use Through Standard Security Attacks [PDF]
Recent advances in instruction-following large language models (LLMs) have led to dramatic improvements in a range of NLP tasks. Unfortunately, we find that the same improved capabilities amplify the dual-use risks for malicious purposes of these models.
Daniel Kang+5 more
semanticscholar +1 more source
Security Fictions: Bridging Speculative Design and Computer Security
This paper begins with an observation: that threat identification is an intrinsically speculative practice. It requires imagining possible futures. Drawing on methods from speculative design, this paper presents an improvisational role-playing game ...
Nick Merrill
semanticscholar +1 more source
Privacy-preserving computation (PPC) enables encrypted computation of private data. While advantageous in theory, the complex technology has steep barriers to entry in practice. Here, we derive design goals and principles for a middleware that encapsulates the demanding cryptography server side and provides a simple-to-use interface to client-side ...
Hendrik Ballhausen+1 more
openaire +2 more sources
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the ...
Joan Arnedo-Moreno, Victor Garcia-Font
doaj +1 more source
Human Factors in Security – Cybersecurity Education and Awareness of Business Students
Theoretical background: The rapid development of Internet interactions and a growing number of information technology users caused by digital society development and accelerated by the COVID-19 pandemic yield the significant growth of cyber-attacks and ...
Łukasz Wiechetek, Marek Mędrek
doaj +1 more source
Towards operational measures of computer security [PDF]
Ideally, a measure of the security of a system should capture quantitatively the intuitive notion of ‘the ability of the system to resist attack’. That is, it should be operational, reflecting the degree to which the system can be expected to remain free
Brocklehurst, S.+8 more
core +2 more sources